Network Management (1,2,3)
Network Management (1,2,3)
3. Fault Detection and Resolution: Network management systems (NMS) detect and
respond to network faults such as device failures, connectivity issues, and
configuration errors. Automated alerts and notifications enable administrators to
quickly identify and resolve network problems, minimizing downtime.
6. Traffic Analysis: Analyzing network traffic patterns and trends provides insights into
application usage, user behavior, and potential security threats. Traffic analysis tools
help optimize network resources, prioritize critical applications, and detect abnormal
behavior indicative of cyber attacks.
7. Configuration Backup and Restore: Regularly backing up network device
configurations is essential for disaster recovery and ensuring quick restoration in case
of failures or security breaches. Automated backup solutions streamline the process
and minimize the risk of data loss.
1. FCAPS Model: The FCAPS model stands for Fault, Configuration, Accounting,
Performance, and Security. It serves as a comprehensive framework for categorizing
network management tasks and functions. Each category addresses a specific aspect
of network management:
a. Fault Management: Detecting, isolating, and resolving network faults or
abnormalities to ensure network availability and reliability.
b. Configuration Management: Managing and maintaining the configuration of
network devices to ensure consistency, compliance, and efficient operation.
c. Accounting Management: Tracking network resource usage, such as
bandwidth consumption and device utilization, for billing, capacity planning,
and auditing purposes.
d. Performance Management: Monitoring and optimizing network performance
parameters, such as bandwidth utilization, latency, and packet loss, to ensure
efficient operation and user satisfaction.
e. Security Management: Implementing measures to protect network
infrastructure, data, and resources from unauthorized access, cyber threats, and
vulnerabilities.
2. SNMP (Simple Network Management Protocol): SNMP is a widely used protocol for
network management and monitoring. It enables network administrators to remotely
monitor and control network devices, retrieve management information, and receive
notifications about network events. SNMP operates based on a manager-agent model,
where SNMP managers collect data from SNMP-enabled agents running on network
devices.
2. Design Network Architecture: Develop a network architecture that aligns with the
organization's requirements and growth plans. Consider factors such as scalability,
redundancy, security, and performance. Define network segmentation, traffic flow
patterns, and hierarchical design principles to optimize network performance and
manageability.
4. Implement Best Practices: Follow industry best practices and standards during
network deployment. Ensure proper cabling, power distribution, and physical security
measures. Configure network devices according to design specifications, security
policies, and performance requirements. Implement redundancy and failover
mechanisms to enhance reliability and availability.
5. Security Implementation: Integrate robust security measures into the network design
and implementation process. Implement firewall policies, access control lists (ACLs),
encryption protocols, intrusion detection/prevention systems (IDS/IPS), and
authentication mechanisms to protect against cyber threats and unauthorized access.
Regularly update and patch network devices to address security vulnerabilities.
7. Capacity Planning: Perform capacity planning to anticipate future growth and ensure
that the network infrastructure can accommodate increasing demands. Analyze
historical usage trends, forecast resource requirements, and scale network capacity
accordingly. Consider factors such as user growth, application requirements, and
emerging technologies.
10. Disaster Recovery and Business Continuity: Develop a disaster recovery plan (DRP)
and business continuity plan (BCP) to mitigate the impact of network outages,
disasters, and security breaches. Implement backup and recovery mechanisms for
critical network components and data. Test and validate DRP/BCP procedures
regularly to ensure their effectiveness in restoring network services.
Performance Management:
● Objective: Performance management focuses on optimizing network
performance to ensure efficient operation and satisfactory user experience.
● Activities: It involves monitoring and analyzing network traffic, bandwidth
utilization, latency, packet loss, and other performance metrics. Performance
management also includes capacity planning, resource optimization, and QoS
(Quality of Service) management to prioritize critical applications and
services.
Fault Management:
● Objective: Fault management aims to detect, isolate, and resolve network
faults or abnormalities to minimize downtime and maintain network
availability.
● Activities: This category involves proactive monitoring of network devices
and links to identify issues such as device failures, connectivity problems,
configuration errors, or performance degradation. Fault management tools
generate alerts, notifications, and event logs to facilitate rapid fault detection
and troubleshooting.
Configuration Management:
● Objective: Configuration management focuses on managing and maintaining
the configurations of network devices to ensure consistency, compliance, and
efficient operation.
● Activities: Configuration management encompasses tasks such as device
provisioning, configuration backup and restoration, firmware updates, and
policy enforcement. It involves documenting device configurations, tracking
changes, and enforcing standardized configuration templates to prevent errors
and ensure compliance with organizational policies and best practices.
Security Management:
● Objective: Security management aims to protect network infrastructure, data,
and resources from unauthorized access, cyber threats, and vulnerabilities.
● Activities: Security management includes implementing security policies,
access controls, encryption mechanisms, and intrusion detection/prevention
systems (IDS/IPS). It involves monitoring network traffic for suspicious
activity, conducting vulnerability assessments, and responding to security
incidents through incident response procedures. Security management also
encompasses user authentication, authorization, and auditing to enforce
compliance with security policies and regulations.
Accounting Management:
● Objective: Accounting management focuses on tracking and managing
network resource usage, such as bandwidth consumption, device utilization,
and user activities, for billing, auditing, and capacity planning purposes.
● Activities: Accounting management involves collecting and analyzing data on
network usage, generating usage reports, and allocating costs or resources
based on usage patterns. It encompasses functions such as billing
reconciliation, user account management, and resource allocation optimization
to ensure efficient resource utilization and cost-effective network operations.
Overview:
Policy-Based Management (PBM) is an approach to network management that emphasizes the use
of policies to define and enforce desired behavior and configuration settings across network devices
and services. Rather than manually configuring individual devices, administrators define policies
that dictate how the network should operate, and automated systems enforce these policies
consistently.
● Scalability: PBM scales effectively with growing network complexity and size, as
policies can be applied uniformly across distributed environments, regardless of the
number of devices or network segments. It facilitates centralized management and
control while accommodating decentralized or distributed deployment models.
● Granular Control and Visibility: PBM offers granular control over network
configurations and behaviors, allowing administrators to define policies at various
levels of abstraction, from global network-wide policies to specific device settings or
user roles. This granular control enhances visibility into network operations and
facilitates targeted troubleshooting and optimization efforts.
● Security and Risk Mitigation: PBM enables proactive enforcement of security policies
and access controls to protect network resources and data from unauthorized access,
cyber threats, and compliance violations. By automatically enforcing security policies
and auditing compliance, PBM helps mitigate security risks and strengthen overall
network security posture.
Implementation Considerations:
● Policy Definition: Define clear, concise policies that align with business objectives,
security requirements, and operational needs. Policies should be well-documented,
unambiguous, and regularly reviewed to ensure relevance and effectiveness.
● Automation Tools: Invest in policy management tools, platforms, or frameworks that
support automated policy enforcement, configuration deployment, and monitoring.
Choose solutions that integrate seamlessly with existing network infrastructure and
management systems.
● Training and Education: Provide training and education to network administrators,
operators, and stakeholders on policy-based management concepts, best practices, and
tools. Foster a culture of policy-driven network management and encourage
collaboration across teams.
● Continuous Improvement: Continuously evaluate and refine policies based on
feedback, performance metrics, and evolving business requirements. Regularly assess
policy effectiveness, compliance, and impact on network operations to identify areas
for improvement and optimization.
1. Structure and Storage: A MIB is structured in a tree format, with each entry or
"node" representing a different type of information that can be gathered from the
network. Each node is identified by an object identifier (OID) which uniquely
identifies a variable that can be read or set via SNMP.
4. Standard and Proprietary MIBs: There are both standard MIBs defined by
standards organizations like the Internet Engineering Task Force (IETF) and
proprietary MIBs designed by vendors for their specific devices. Standard MIBs
ensure interoperability between different devices and management systems.
1. Data Types: SMI defines a set of data types that are used for defining managed
objects in a network. These include basic types such as INTEGER, OCTET STRING
(a string of bytes), and more specific types like IpAddress, Counter32, and TimeTicks.
3. MIB Structure: The SMI dictates how MIBs are structured. MIBs are organized into
a tree structure with each node represented by an OID. The tree starts from a set of
root nodes which branch out into a hierarchy of more specific categories. For
example, all OIDs under the Internet Assigned Numbers Authority (IANA) start with
1.3.6.1.
4. Modules: MIB definitions are grouped into modules. Each module can be thought of
as a file containing definitions for a group of related objects. SMI allows these
modules to be imported and combined, making it easier to extend SNMP management
capabilities as needed.
5. Syntax and Naming Rules: SMI defines specific rules for the syntax of MIB
definitions, including how to name objects consistently. It also dictates how to declare
the type, status, and access level of each managed object (whether it's read-only,
read-write, etc.).
6. Extensions and Versions: Over the years, SMI has been extended and revised to
support new data types and functionalities. The versions include SMIv1 and SMIv2,
where SMIv2 introduced additional data types like 64-bit counters and more flexible
table structures.
Hierarchical View
● Tree Structure Visualization: Many NMS tools provide a graphical representation of
the MIB tree, helping administrators visually understand the hierarchical structure of
network information. Each node in the tree corresponds to an object defined by the
SMI, represented by its unique Object Identifier (OID).
Object Details
● Attributes and Descriptions: NMS tools display detailed attributes of each managed
object, including its name, OID, syntax (data type), and access level (read-only or
read-write). Descriptions from the MIB help clarify the purpose and use of each
object.
● Current Values: Administrators can view the current value of each object, which
may represent specific metrics like bandwidth usage, error counts, or device status.
Benefits
● Proactive Management: By monitoring network metrics in real time, administrators
can identify and resolve issues before they affect network services.
● Optimized Resource Utilization: Detailed insights into traffic and performance
allow for better resource allocation and network planning.
● Enhanced Troubleshooting: Quick access to detailed metrics speeds up the
troubleshooting process, reducing downtime and improving service levels.
RMON Groups
RMON is structured into different groups, each collecting specific types of data. These groups are:
1. Statistics Group: Provides statistical information for each monitored interface on the
network device, including packet counts, byte counts, broadcasts, and multicast
statistics.
2. History Group: Periodically collects samples of statistics data, allowing for the
analysis of network trends over time.
3. Alarm Group: Allows administrators to set thresholds on statistics values. If a
threshold is crossed, an event is generated.
4. Host Group: Provides statistics about each host discovered on the network, including
packet and byte counts.
5. HostTopN Group: Provides a list of hosts that have consumed the most network
resources over a period of time, helping to identify heavy users or potential issues.
6. Matrix Group: Provides traffic matrix information between pairs of hosts on the
network, useful for detailed traffic analysis.
7. Filter Group: Allows traffic to be captured based on filters which can be defined by
the administrator.
8. Packet Capture Group (or Capture Group): Enables packets to be captured into a
buffer, allowing for in-depth analysis.
9. Event Group: Provides facilities to log and notify significant incidents or threshold
violations.
Applications of RMON
● Network Performance Monitoring: Monitoring traffic load, error rates, and other
metrics to maintain and optimize network performance.
● Capacity Planning and Network Analysis: Using historical data to predict future
network needs and plan upgrades.
● Security Monitoring: Identifying unusual traffic patterns or unexpected traffic sources
that may indicate security breaches or network misuse.
Components of DMI
DMI typically consists of three major components:
1. Management Information Format (MIF): This is a database used by DMI to store
information. Each piece of hardware or software provides a MIF file containing
specific details that DMI can compile into its repository.
2. Service Layer: This component acts as an intermediary between the system's
hardware and the software applications that need hardware information. It processes
requests from management software and retrieves the necessary data from the MIF
database.
3. Software Layer: The software layer includes various management applications that
use the DMI service layer to perform tasks such as monitoring system health, tracking
assets, and configuring system settings.
Applications of DMI
● Asset Management: DMI makes it easier for organizations to manage their hardware
and software assets effectively by providing detailed inventories.
● Remote Monitoring and Management: With DMI, administrators can monitor and
manage systems remotely, which is particularly useful for managing large networks
spread across multiple locations.
● Compliance and Security: By maintaining a detailed record of hardware and software
configurations, DMI helps in ensuring compliance with corporate standards and
security policies.
DMI Architecture
The architecture of the Desktop Management Interface (DMI) involves several key components that
work together to provide a comprehensive management interface between system hardware and
software applications. Here’s how the architecture is structured:
1. Management Information Format (MIF):
● MIF Database: This database stores details about the hardware and software
components of the system. Each component in the system provides a MIF file
containing specific details which DMI can use to compile information into its
repository.
2. Service Layer:
● DMI Service Provider: Acts as an intermediary that interfaces directly with
the system hardware. It processes requests from higher-level management
software and retrieves or updates the necessary data in the MIF database. The
service provider is essentially the core of the DMI, handling all data
interactions.
3. Software Layer:
● DMI Management Applications: These are high-level applications used by
network administrators to access the DMI data. They interact with the DMI
Service Provider to perform tasks such as querying for system information,
monitoring system health, and tracking assets.
4. Component Interface:
● Software Components: These are dynamically loadable modules that can
interact directly with the hardware, extending the capabilities of the DMI by
adding new functions or supporting additional hardware.
5. SPI (Service Provider Interface):
● This interface allows for communication between the service layer and the
hardware-specific component interface modules. It ensures that requests and
commands are correctly passed and responses are received and handled.
DMI Browser
A DMI Browser is a tool or application that allows users to view and manage the information
stored in the DMI's MIF database. The DMI Browser makes it possible for administrators to easily
navigate through the hierarchical structure of the management information stored by the DMI.
Applications:
● Troubleshooting and Support: Helps in quickly identifying hardware or software
issues by providing immediate access to detailed system configurations.
● Audit and Compliance: Assists in auditing systems to ensure they meet compliance
standards by providing detailed logs and reports of system configurations.
● Asset Management: Enables effective management of IT assets by keeping track of
hardware and software components and their states.
DMI/SNMP Mapping
DMI/SNMP mapping involves integrating the Desktop Management Interface (DMI) with the
Simple Network Management Protocol (SNMP) to allow SNMP management tools to access
information managed by DMI. This mapping is crucial because it bridges the gap between DMI,
which is primarily focused on desktop and system management, and SNMP, which is widely used
for network device management across various platforms.
Implementation:
● Mapping Tables: The integration is often facilitated through mapping tables that
convert DMI data into SNMP-compatible formats. These tables help translate DMI
MIF data into SNMP MIBs (Management Information Bases), making it accessible
via SNMP queries.
● Proxy Agents: Some implementations use proxy agents that act as intermediaries.
These agents fetch data from the DMI on a system and provide it to SNMP managers
as if it were from a standard SNMP agent.
Desktop SNMP Extension Agents
Desktop SNMP Extension Agents are software components that extend the capabilities of SNMP to
desktop management. They are designed to collect and provide management information specific to
desktop systems, which can then be accessed via standard SNMP tools.
Key Features:
● Detailed System Information: These agents gather detailed information about the
system's hardware and software, similar to what DMI provides, but accessible through
SNMP protocols.
● Custom SNMP MIBs: They often involve defining custom MIBs tailored to the
specific needs of desktop management. These MIBs can include metrics such as CPU
usage, memory usage, system up-time, installed applications, and more.
● Real-time Monitoring and Alerts: Like other SNMP agents, desktop SNMP
extension agents can provide real-time monitoring and alerts based on predefined
thresholds for various system parameters.
Applications:
● Centralized Management: Facilitates the centralized management of desktop
systems along with network devices, providing a holistic view of an organization’s IT
environment.
● Interoperability: Ensures that information from desktops can be seamlessly
integrated and managed along with data from other networked devices, using standard
network management systems.
● Automation and Scalability: Supports automation of management tasks and scales
well for managing large numbers of desktops across an enterprise.
Configuring SNMP
1. Choose the SNMP Version:
● SNMPv1, SNMPv2c, and SNMPv3 are the most common versions, with
SNMPv3 offering enhanced security features.
2. Install SNMP Agent:
● Install SNMP agent software on devices that need to be managed. Many
network devices come with SNMP agents pre-installed.
3. Configure SNMP Community Strings (for SNMPv1/SNMPv2c):
● Set the community strings, which act like passwords. There are typically two
types of community strings: "public" (read-only access) and "private"
(read-write access).
4. Configure SNMP Users and Groups (for SNMPv3):
● Unlike SNMPv1 and SNMPv2c, SNMPv3 uses username-based
authentication and can encrypt SNMP messages.
● Configure user accounts, authentication protocols, and encryption settings.
5. Set SNMP Managers:
● Configure network management software to communicate with SNMP agents.
Specify which devices it should monitor.
6. Enable SNMP Traps/Informs:
● Configure SNMP agents to send traps (or informs) to the SNMP manager.
Traps are notifications about significant events or changes in the network
device status.
7. Secure SNMP Configuration:
● Especially for SNMPv1 and SNMPv2c, ensure that community strings are
well guarded as they are transmitted in clear text.
● Use access control lists (ACLs) to restrict which hosts can send SNMP
requests to network devices.
1. Physical Layer (Layer 1): Handles the physical transmission of raw data over a
communication channel. This includes the layout of pins, voltages, cable
specifications, and radio frequencies.
2. Data Link Layer (Layer 2): Provides node-to-node data transfer—a link between
two directly connected nodes. It also handles error correction from the physical layer.
3. Network Layer (Layer 3): Manages device addressing, tracks the location of devices
on the network, and determines the best way to move data. This layer routes packets
according to unique network addresses.
4. Transport Layer (Layer 4): Transports data across a network and provides error
checking and recovery of data between the host and destination.
5. Session Layer (Layer 5): Manages sessions between end-user applications, e.g., the
opening, closing, and management of sessions between end-user applications.
6. Presentation Layer (Layer 6): Transforms data to provide a standard interface for
the application layer. Encryption, compression, and translation of data between
different formats are typical functions.
7. Application Layer (Layer 7): Provides services directly to user applications, such as
email, file transfer, and other types of communication.
TCP/IP Layering
The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a more streamlined version
of the OSI model and is the standard for how data is exchanged over the internet. It has four layers:
2. Internet Layer (Network Layer): Responsible for sending packets from any
network, and they arrive at the destination irrespective of the route they take. IP
(Internet Protocol) is a primary protocol in this layer.
3. Transport Layer: Similar to the OSI model, this layer provides end-to-end
communication services for applications within a layered architecture of network
components and protocols. TCP and UDP are two of the main protocols used in this
layer.
● Development and Adoption: The OSI model was developed as a theoretical and
comprehensive model aimed at universal interoperability. In contrast, TCP/IP was
developed and refined through practical, real-world implementation.
● Protocol Specificity: TCP/IP model names and uses specific protocols. The OSI
model is more generic and covers a broader range of protocols.
2. Internet Protocol (IP) - Specifies the format of packets and the addressing system
for computers on the network. IP is part of the larger TCP/IP protocol suite, which is
the foundation of the Internet.
3. Hypertext Transfer Protocol (HTTP) - The protocol used for transferring web pages
over the Internet. It can be secured with HTTPS (where "S" stands for Secure), which
encrypts data to maintain privacy.
4. Simple Mail Transfer Protocol (SMTP) - Used for sending emails across networks.
5. File Transfer Protocol (FTP) - Used for transferring files between computers on a
network. It can be secured with FTPS or replaced with SFTP (SSH File Transfer
Protocol) for security.
Internet Standards
Internet standards are developed by various organizations but primarily by the Internet Engineering
Task Force (IETF). The IETF develops and promotes voluntary Internet standards, in particular the
standards that comprise the Internet protocol suite (TCP/IP). It is an open standards organization,
with no formal membership or membership requirements.
2. Internet Corporation for Assigned Names and Numbers (ICANN) - Manages the
DNS (Domain Name System) which helps maintain the overall structure of the
Internet.
3. World Wide Web Consortium (W3C) - Focuses on standards for the World Wide
Web and its interoperability with other parts of the Internet. The Consortium develops
protocols and guidelines that ensure long-term growth for the Web.
Internet Administration
Internet administration involves the coordination and management of the core components that
keep the Internet operational. These activities include managing the allocation of IP addresses,
overseeing domain name registration, setting internet standards, and ensuring stable and secure
operation of the global internet.
Internet Addresses
Internet addresses refer to unique identifiers necessary for devices to communicate over the
Internet. The most common types of internet addresses include:
1. IP Addresses: Every device connected to the Internet is assigned a unique IP address
which is used to identify and communicate with other devices. IP addresses can be
static (permanently assigned to a device) or dynamic (assigned temporarily).
2. Domain Names: Human-readable addresses used to access websites, such as
www.example.com. Domain names are translated into IP addresses by DNS servers.
3. Email Addresses: Addresses used to send and receive email, typically formatted as
[email protected].
1. IPv4 (Internet Protocol version 4): The original IP version used since the 1980s,
which uses a 32-bit address scheme allowing for 2^32 addresses (over 4 billion
addresses). IPv4 addresses are usually written as four decimal numbers, each ranging
from 0 to 255, separated by dots (e.g., 192.158.1.38).
2. IPv6 (Internet Protocol version 6): Developed to deal with the long-anticipated
problem of IPv4 address exhaustion. IPv6 uses a 128-bit address, allowing for a vastly
larger number of addresses. It is written as eight groups of four hexadecimal digits,
separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
IP Header
The IP header is part of an IP packet that encapsulates data to be transferred over the Internet. It
contains several pieces of information critical for delivering the packet to the right destination:
1. Version: The IP version, either IPv4 or IPv6.
4. Total Length: The length of the entire packet, including the header and data.
6. Time to Live (TTL): Limits the lifespan of data in the network, preventing it from
circulating indefinitely.
7. Protocol: Indicates the next level protocol used in the data portion of the IP datagram.
11. Options (if any): Allows for additional options to be added to the header; this field is
optional and variable in length.
12. Data (Payload): The actual data being transported, which follows the header.
IP Routing
IP routing is the process of forwarding a packet from a source device to a destination device across
one or more IP networks. Key concepts include:
● Routing Tables: Used by routers to make forwarding decisions; they contain
information about which paths lead to particular networks.
● Routing Protocols: Algorithms that help routers dynamically learn about paths on the
network. Examples include RIP (Routing Information Protocol), OSPF (Open
Shortest Path First), and BGP (Border Gateway Protocol).
● Subnet Mask: A 32-bit number that masks an IP address and divides the IP address
into network address and host address parts. For example, the subnet mask
255.255.255.0 applied to an IPv4 address indicates that the first three octets are the
network part, and the last octet is the host part.
Special Cases of IP Addresses
There are several special cases in IP addressing that serve specific purposes:
1. Loopback Addresses: Used to send a network test message to the local computer.
For IPv4, this is 127.0.0.1 to 127.255.255.255, where 127.0.0.1 is commonly used.
2. Private IP Addresses: These addresses are used inside private networks and are not
routable on the internet. Common private IPv4 address ranges include 10.0.0.0 -
10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255.
4. Broadcast Address: Used to send data to all possible destinations within the network
(typically ends with 255, like 192.168.1.255 in a typical home network).
Understanding ARP:
Purpose of ARP:
ARP's main task is to enable communication within a local network by mapping network addresses
(IP addresses in the case of IPv4) to physical hardware addresses (MAC addresses). This mapping
is crucial for the network operation since devices on a local network like Ethernet communicate
using MAC addresses.
1. ARP Request: When a device needs to communicate with another device on a local
network and knows the IP address but not the MAC address, it broadcasts an ARP
request packet to all devices on the local network. The packet includes the sender's
MAC and IP addresses and the IP address of the destination device.
2. ARP Reply: The device with the matching IP address sends back an ARP reply. This
reply is not broadcast but sent directly to the requester. It contains the MAC address
that corresponds to the IP address in question.
3. Caching: Once the original device receives the MAC address, it stores this
information in its ARP cache for future reference, which reduces the need to repeat
the ARP request for subsequent communications.
1. Hardware Type: Specifies the type of network protocol being used (e.g., Ethernet is
1).
2. Protocol Type: Specifies the type of higher-layer protocol that uses the ARP (e.g.,
IPv4 is 0x0800).
4. Protocol Address Length: Length of the protocol address (IP address), typically 4
bytes for IPv4.
5. Operation: Specifies the operation; 1 for ARP request, 2 for ARP reply.
8. Target Hardware Address: MAC address of the intended receiver (blank in ARP
request).
Proxy ARP
Proxy ARP is a technique by which one device on a network answers ARP requests intended for
another machine. By sending an ARP reply on behalf of another node, the responding device is
"pretending" to be the destination host. This can be useful in several scenarios, such as:
● Connecting multiple networks: Proxy ARP can help machines on a subnet reach
remote subnets without the need to configure routing or a gateway.
● Handling IP address subnetting: In cases where two IP subnets are on the same
physical network, Proxy ARP can help machines on one subnet communicate with
machines on another without the sender knowing the subnet division.
ARP Command
The arp command is used on most operating systems to display and modify the ARP cache that
stores IP to MAC address mappings. Here are common uses:
● View ARP table: On Windows, use arp -a to display the current ARP table entries.
● Add to ARP table: Use arp -s <IP address> <MAC address> to add a static entry to
the ARP table.
● Delete from ARP table: Use arp -d <IP address> to delete an entry from the ARP
table.
ARP Example
Scenario: A computer (Computer A) needs to send data to another computer (Computer B) on the
same local network but does not know Computer B's physical address.
1. ARP Request: Computer A broadcasts an ARP request onto the local network,
asking "Who has IP address 192.168.1.5?"
2. ARP Reply: Computer B, which has IP address 192.168.1.5, receives the ARP
request and sends back an ARP reply, saying "192.168.1.5 is at MAC address
00:1A:2B:3C:4D:5E."
3. Caching: Computer A receives this ARP reply and stores the IP-to-MAC mapping in
its ARP cache for future use.
Introduction to RARP
RARP was historically used for diskless computers to determine their IP address using the network
upon booting. Since these systems do not have permanent storage, they lack the capability to store
their network configurations. Thus, upon startup, they use RARP to request their IP configuration
from a RARP server on the network.
However, RARP has largely been superseded by more robust protocols like BOOTP and DHCP,
which not only provide an IP address but also additional network configuration details.
RARP Packet Format
A RARP packet is very similar to an ARP packet and is encapsulated within an Ethernet frame. It
has the following structure:
1. Hardware Type (2 bytes): Type of hardware interface; for Ethernet, the value is 1.
2. Protocol Type (2 bytes): Type of high-level protocol address being requested; for IP,
the value is 0x0800.
3. Hardware Address Length (1 byte): Length of the hardware address; for Ethernet, it
is 6 bytes.
4. Protocol Address Length (1 byte): Length of the protocol address; for IP, it is 4
bytes.
5. Operation (2 bytes): Specifies the operation; for RARP request, it is 3, and for
RARP reply, it is 4.
8. Target Hardware Address (6 bytes): MAC address of the target (the same as Sender
Hardware Address for RARP).
RARP Examples
Scenario: A diskless workstation boots up and needs to determine its IP address. It knows its MAC
address but not its IP address.
● RARP Request: The workstation broadcasts a RARP request on the local network.
This request includes its MAC address and asks for the corresponding IP address.
● RARP Reply: A RARP server on the network recognizes the request, looks up the
MAC address in its table of MAC to IP address mappings, and sends back a RARP
reply containing the IP address assigned to that MAC address.
The design and implementation of a RARP server involve setting up a reliable and responsive
service that can handle multiple simultaneous requests and can integrate smoothly with existing
network infrastructure. Given that RARP does not provide any means for authentication or
configuration beyond the IP address, it's limited compared to more modern solutions like DHCP,
which can dynamically allocate not just IP addresses but also other network settings (DNS, subnet
mask, gateway, etc.).